Application of Block Chain Technology in Constructing Network Threat Intelligence System
暂无分享,去创建一个
Wu Yang | Wei Wang | Shichang Xuan | Hao Tang | Wu Yang | Wei Wang | Shichang Xuan | Hao Tang
[1] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[2] Kuai Xu,et al. Internet Traffic Behavior Profiling for Network Security Monitoring , 2008, IEEE/ACM Transactions on Networking.
[3] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[4] Arjun Raj,et al. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems : A Review , 2015 .
[5] Yuan-Cheng Lai,et al. An extended SDN architecture for network function virtualization with a case study on intrusion prevention , 2015, IEEE Network.
[6] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[7] Zahir Tari,et al. Data summarization for network traffic monitoring , 2014, J. Netw. Comput. Appl..
[8] Ali Doustmohammadi,et al. Intrusion Detection in Cyber-Physical Systems Based on Petri Net , 2018, Inf. Technol. Control..
[9] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[10] Hsiao-Hwa Chen,et al. Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.
[11] Fang Liu,et al. HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches , 2015, IEEE Transactions on Knowledge and Data Engineering.
[12] Ning Cao,et al. Network Security Situation Awareness Framework based on Threat Intelligence , 2018 .